Endpoint

2/12/2018
12:50 PM
50%
50%

Microsoft Adds Windows Defender ATP Support to Windows 7, 8.1

Microsoft brings Windows Defender ATP down-level support to older versions of Windows for businesses transitioning to Windows 10.

Microsoft is adding Windows Defender Advanced Threat Protection (ATP) down-level support for Windows 7 and Windows 8.1. This will provide additional security to businesses gradually updating their devices to Windows 10, ahead of the end-of-life for Windows 7 in January 2020.

Windows Defender ATP is an endpoint security platform built to prevent breaches in Windows 10. Until now, it has been exclusive to Microsoft's latest OS. The company is adding support to older versions of Windows because businesses in the process of upgrading likely have a mix of devices running Windows 10, Windows 7, and Windows 8.1 in their environments.

Starting this summer, businesses still transitioning to Windows 10 can add Windows Defender ATP Endpoint Detection & Response (EDR) functionality to Windows 7 and Windows 8.1. The support will give them a broader view of security across endpoints running older systems.

Detections and events will appear in the Windows Defender Security Center, the cloud-based console for Defender ATP, so admins can view and respond to malware detections. Microsoft reports the tool can run alongside third-party antivirus tools in addition to its Windows Defender Antivirus, also known as System Center Endpoint Protection (SCEP) for down-level.

Read more details here.

 

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10869
PUBLISHED: 2018-07-19
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.
CVE-2018-10870
PUBLISHED: 2018-07-19
redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution.
CVE-2018-12959
PUBLISHED: 2018-07-19
The approveAndCall function of a smart contract implementation for Aditus (ADI), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all contract balances into their account).
CVE-2018-14336
PUBLISHED: 2018-07-19
TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.
CVE-2018-10620
PUBLISHED: 2018-07-19
AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code t...